A survey on anti-spoofing methods for facial recognition with rgb cameras of generic consumer devices

Z Ming, M Visani, MM Luqman, JC Burie - Journal of imaging, 2020 - mdpi.com
The widespread deployment of facial recognition-based biometric systems has made facial
presentation attack detection (face anti-spoofing) an increasingly critical issue. This survey …

Deep learning techniques for biometric security: A systematic review of presentation attack detection systems

K Shaheed, P Szczuko, M Kumar, I Qureshi… - … Applications of Artificial …, 2024 - Elsevier
Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely
used to enhance security in various devices. In the past decade, significant progress has …

A survey on 3D mask presentation attack detection and countermeasures

S Jia, G Guo, Z Xu - Pattern recognition, 2020 - Elsevier
Despite the impressive progress in face recognition, current systems are vulnerable to
presentation attacks, which subvert the face recognition systems by presenting a face …

A review of state-of-the-art in Face Presentation Attack Detection: From early development to advanced deep learning and multi-modal fusion methods

F Abdullakutty, E Elyan, P Johnston - Information fusion, 2021 - Elsevier
Face Recognition is considered one of the most common biometric solutions these days and
is widely used across a range of devices for various security purposes. The performance of …

A survey on face presentation attack detection mechanisms: hitherto and future perspectives

D Sharma, A Selwal - Multimedia Systems, 2023 - Springer
The advances in human face recognition (FR) systems have recorded sublime success for
automatic and secured authentication in diverse domains. Although the traditional methods …

Attention-based spatial-temporal multi-scale network for face anti-spoofing

W Zheng, M Yue, S Zhao, S Liu - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Face anti-spoofing is essential to the face recognition system. Although previous work has
made great progress in spatial auxiliary supervision and temporal feature extraction, there …

[PDF][PDF] Digital and physical face attacks: Reviewing and one step further

C Kong, S Wang, H Li - APSIPA Transactions on Signal and …, 2022 - nowpublishers.com
With the rapid progress over the past five years, face authentication has become the most
pervasive biometric recognition method. Thanks to the high-accuracy recognition …

Dynamic texture analysis for detecting fake faces in video sequences

M Bonomi, C Pasquini, G Boato - Journal of Visual Communication and …, 2021 - Elsevier
The creation of manipulated multimedia content involving human characters has reached in
the last years unprecedented realism, calling for automated techniques to expose …

Continuous authentication using biometrics: An advanced review

G Dahia, L Jesus… - … Reviews: Data Mining …, 2020 - Wiley Online Library
The shortcomings of conventional access control systems for high‐security environments
have led to the concert of continuous authentication. Contrary to traditional verification, in …

EEG channel selection using multiobjective cuckoo search for person identification as protection system in healthcare applications

Z Abdi Alkareem Alyasseri, OA Alomari… - Computational …, 2022 - Wiley Online Library
Recently, the electroencephalogram (EEG) signal presents an excellent potential for a new
person identification technique. Several studies defined the EEG with unique features …